header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Disk Pulse Enterprise 9.1.16 Login Buffer Overflow

Exploit will land you NT AUTHORITYSYSTEM. You do not need to be authenticated, password below is garbage. Swop out IP, shellcode and remember to adjust 'x41' for bytes. Tested on Windows 7 x86 Enterprise SP1. Vendor has been notified on multiple occasions. Exploit for version 9.0.34: www.exploit-db.com/exploits/40452/

LiveCMS <= 3.4 SQL Injection, Absolute Path Disclosure, XSS Injection, Arbitrary File Upload

This is a free CMS system. The absolute path is disclosed in a MySQL error when categoria.php's parameter cid is queried with a non-defined variable. Article names are not properly sanitized, allowing a user to insert malicious JavaScript. Articles can have a small image that is uploaded without proper validation, allowing for arbitrary file upload.

sieve

This bug can cause a DoS by handling a kernel paging request incorrectly. The exploit triggers a kernel crash with the RIP address being new_page_node+0x31/0x48. The bug was discovered by Ramon de Carvalho Valle in September 2009 through fuzzing. A proof-of-concept DoS was sent on September 24th. The bug was reported to Novell's internal bugzilla and later falsely credited to Marcus Meissner of SuSE security. The exploit was created in 2010 and it is mentioned that the next exploit will target a bug class that has not been exploited on Linux before.

Dlink DIR Routers Unauthenticated HNAP Login Stack Buffer Overflow

Several Dlink routers contain a pre-authentication stack buffer overflow vulnerability, which is exposed on the LAN interface on port 80. This vulnerability affects the HNAP SOAP protocol, which accepts arbitrarily long strings into certain XML parameters and then copies them into the stack. This exploit has been tested on the real devices DIR-818LW and 868L (rev. B), and it was tested using emulation on the DIR-822, 823, 880, 885, 890 and 895. Others might be affected, and this vulnerability is present in both MIPS and ARM devices. The MIPS devices are powered by Lextra RLX processors, which are crippled MIPS cores lacking a few load and store instructions. Because of this the payloads have to be sent unencoded, which can cause them to fail, although the bind shell seems to work well. For the ARM devices, the inline reverse tcp seems to work best. Check the reference links to see the vulnerable firmware versions.

Recent Exploits: